SonicWall has recently added CVE-2025-32818 to its Known Exploited Vulnerabilities (KEV) Catalog. This critical vulnerability impacts Generation 7 and 8 SonicWall Firewall products running specific firmware versions.
At Logically, we are committed to proactive security and swift action. Below, we outline our planned response to ensure our customers' environments remain secure and resilient.
What is Logically doing?
At Logically, we are committed to ensuring the security of your systems. We have determined that the best course of action is to upgrade affected devices to patched versions of firmware.
What Are We Asking of Our Valued Clients?
If you are a managed service customer with an active Logically support agreement for your SonicWall appliance, we are actively creating service tickets to patch the firmware to a non-affected version. Please respond to the ticket with your desired maintenance window as soon as possible, as upgrading the firmware requires a reboot of the impacted SonicWall device(s), which will temporarily interrupt network availability.
If you are not on a Logically Managed Firewall agreement and operate a device listed as affected, we can still help. Reach out to your Account Manager, Customer Success Manager, or submit a service ticket, and we will coordinate the firmware upgrade for you at a billable rate.
Summary of the Vulnerability:What is Known:
SonicWall PSIRT is aware of the vulnerability and has posted recommendations to upgrade devices. There is no evidence that these vulnerabilities are being exploited in the wild, but SonicWall strongly advises users of affected firmware versions to upgrade as soon as possible. Devices with SSL VPN disabled are not affected, and there are no viable workarounds if SSL VPN is enabled.
Affected version(s):
Patched version(s):
We’ve got your back — our team is already on top of CVE-2025-32818, and we’ll keep working to make sure everyone is safe!